Hiding Hardware Trojan Communication Channels in Partially Specified SoC Bus Functionality
نویسندگان
چکیده
منابع مشابه
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, malicious hardware components can be covertly inserted at the foundry to implement hidden backdoors for unauthorized exposure of secret information. This paper proposes a new class of hardware Trojans which intentionally induce ph...
متن کاملHardware Trojan Side-Channels Based on Physical Unclonable Functions
The separation design and fabrication process in the semiconductor industry leads to potential threats such as trojan side-channels (TSCs). In this paper we design a new family of TSCs from physical unclonable functions (PUFs). In particular, a dedicated attack on the PRESENT block cipher is described by using our PUF-based TSCs. Finally we analyze the performance of our PUF-based TSCs and disc...
متن کاملNecessary and Sufficient Functionality and Parameters for SoC Communication
When implementing communication functionality in a real system, usually this can be done in several different ways, depending on the application and the chosen/resulting target architecture. Implementation options should be general enough to cover a wide variety of both applications and architectures. In this document, we aim to describe, list and summarize all the options for implementation of...
متن کاملSOC IC Trojan Thwarting by Identification of Trojan
IC Trojan horse is a serious technical problem faced by SOC developers. Most of the SOC developers use third party IP components for their design purpose. So comparing with a Trojan-less counterpart is impossible. Villasenor and Kim proposed bus architecture to detect Trojan activity where, when the circuit realizes the presence of a Trojan, it informs the CPU by an interrupt. In this paper, we...
متن کاملHardware Trojan vulnerability
Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single positive feedback loop. By example, it is shown...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
سال: 2017
ISSN: 0278-0070,1937-4151
DOI: 10.1109/tcad.2016.2638439